basharkey / CVE-2022-0847-dirty-pipe-checkerLinks
Bash script to check for CVE-2022-0847 "Dirty Pipe"
☆67Updated 2 years ago
Alternatives and similar repositories for CVE-2022-0847-dirty-pipe-checker
Users that are interested in CVE-2022-0847-dirty-pipe-checker are comparing it to the libraries listed below
Sorting:
- PHP 8.1.0-dev Backdoor System Shell Script☆94Updated 4 years ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆166Updated 3 months ago
- A couple of different scripts, made to automate attacks against NoSQL databases.☆67Updated last year
- Joomla! < 4.2.8 - Unauthenticated information disclosure☆91Updated last year
- ☆108Updated last year
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆110Updated 11 months ago
- ☆51Updated last year
- A wordlist generator tool, that allows you to supply a set of words, giving you the possibility to craft multiple variations from the giv…☆110Updated 2 years ago
- A compact guide to network pivoting for penetration testings / CTF challenges.☆219Updated last year
- OpenSSH 2.3 < 7.7 - Username Enumeration☆43Updated 2 years ago
- CVE-2017-8917 - SQL injection Vulnerability Exploit in Joomla 3.7.0☆67Updated 3 years ago
- Simple HTTP listener for security testing☆119Updated last year
- A wordlist repository with human-curated and reviewed content.☆120Updated 2 years ago
- This project is aimed at freely providing technical guides on various hacking tools.☆119Updated last year
- Multi-threaded, IPv6 aware, wordlists/single-user username enumeration via CVE-2018-15473☆110Updated last year
- Generate common Reverse Shells for Pentesting☆42Updated 4 years ago
- Script to parse Aircrack-ng captures into a SQLite database and extract useful information like handshakes, MGT identities, interesting r…☆119Updated last month
- A CLI tool & library to enhance and speed up script/exploit writing with string conversion/manipulation.☆89Updated 6 months ago
- ☆67Updated 3 years ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆180Updated last year
- This tool use fuuzzing to try to bypass unknown authentication methods, who knows...☆253Updated last year
- Aggregated wordlist pulled from commonly used tools for discovery, enumeration, fuzzing, and exploitation.☆203Updated last year
- brute-forcing su for fun and possibly profit☆97Updated 6 years ago
- WPXStrike is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's criticals…☆69Updated last year
- Classic Web shell upload techniques & Web RCE techniques☆52Updated 2 months ago
- A simple python script to dump remote files through a local file read or local file inclusion web vulnerability.☆77Updated last year
- WiFi hacking Lab. Virtualized WiFi pentesting laboratory without the need for physical WiFi cards, using mac80211_hwsim and vwifi proyect…☆60Updated 2 years ago
- OWASP based Web Application Security Testing Checklist☆80Updated last year
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆98Updated 2 years ago
- Notes from various sources for preparing to take the OSCP, Capture the Flag challenges, and Hack the Box machines.☆84Updated 4 months ago